首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Recently, Li et al. (Int. J. Theor. Phys. 53(9), 2923–2930 (2014)) presented the concrete representation of density matrix of symmetric quantum states . Moreover , according to this concrete representation of the density matrix for symmetric quantum states, Li et al. (Int. J. Theor. Phys. 53(9), 2923–2930 (2014)) have established Theorem 4.1. In this Comment, we would like to point out that Theorem 4.1 given by Li et al. (Int. J. Theor. Phys. 53(9), 2923–2930 (2014)) is incorrect in general.  相似文献   

2.
Recently, Zhao-Hui Wei et al. (Int. J. Theor. Phys. 55, 4687, 2016) proposed an improved quantum teleportation scheme for one three-qubit unknown state with a four-qubit quantum channel based on the original one proposed by Binayak S. Choudhury and Arpan Dhara (Int. J. Theor. Phys. 55, 3393, 2016). According to their schemes, the three-qubit entangled state could be teleported with one four-qubit cluster state and five-qubit joint measurements or four-qubit joint measurements. In this paper, we present an improved protocol only with single-qubit measurements and the same four-qubit quantum channel, lessening the difficulty and intensity of necessary operations.  相似文献   

3.
Recently, Choudhury (Int. J. Theor. Phys. 10, 1007 2016), proposed a teleportation protocol of three-qubit state using four-qubit quantum channels.According to their scheme the three-qubit entangled states could be teleported by use of three simultaneous quantum channels of four-qubit cluster states. In this paper,we emphasize that the same three-qubit entangled states can be teleported perfectly by using only one quantum channel of four-qubit cluster states.  相似文献   

4.
Recently, Xie et al. Int. J. Theor. Phys. 54, 3819–3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027–4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.’s paper has some problems, we analyze Yin et al.’s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.  相似文献   

5.
Recently, Jia et al. proposed the quantum private comparison protocol with the genuine four-particle entangled states (Jia et al., Int. J. Theor. Phys. 51(4), 1187–1194 (2012)). Jia et al. claimed that in this protocol, TP cannot obtain Alice and Bob’s secrets and only knows their comparison result. However, in this paper, we demonstrate that if TP is a genuine semi-honest third party, he can totally obtain Alice and Bob’s secrets by launching a particular intercept-resend-measure attack. After suggesting the intercept-resend-measure attack strategy from TP first, we put forward one corresponding improvement to prevent this attack.  相似文献   

6.
Quantum systems are easily influenced by ambient environments. Decoherence is generated by system interaction with external environment. In this paper, we analyse the effects of decoherence on quantum games with Eisert-Wilkens-Lewenstein (EWL) (Eisert et al., Phys. Rev. Lett. 83(15), 3077 1999) and Marinatto-Weber (MW) (Marinatto and Weber, Phys. Lett. A 272, 291 2000) schemes. Firstly, referring to the analytical approach that was introduced by Eisert et al. (Phys. Rev. Lett. 83(15), 3077 1999), we analyse the effects of decoherence on quantum Chicken game by considering different traditional noisy channels. We investigate the Nash equilibria and changes of payoff in specific two-parameter strategy set for maximally entangled initial states. We find that the Nash equilibria are different in different noisy channels. Since Unruh effect produces a decoherence-like effect and can be perceived as a quantum noise channel (Omkar et al., arXiv:1408.1477v1), with the same two parameter strategy set, we investigate the influences of decoherence generated by the Unruh effect on three-player quantum Prisoners’ Dilemma, the non-zero sum symmetric multiplayer quantum game both for unentangled and entangled initial states. We discuss the effect of the acceleration of noninertial frames on the the game’s properties such as payoffs, symmetry, Nash equilibrium, Pareto optimal, dominant strategy, etc. Finally, we study the decoherent influences of correlated noise and Unruh effect on quantum Stackelberg duopoly for entangled and unentangled initial states with the depolarizing channel. Our investigations show that under the influence of correlated depolarizing channel and acceleration in noninertial frame, some critical points exist for an unentangled initial state at which firms get equal payoffs and the game becomes a follower advantage game. It is shown that the game is always a leader advantage game for a maximally entangled initial state and there appear some points at which the payoffs become zero.  相似文献   

7.
In two papers Franz et al. proved bounds for the free energy of diluted random constraints satisfaction problems, for a Poisson degree distribution (Franz and Leone in J Stat Phys 111(3–4):535–564, 2003) and a general distribution (Franz et al. in J Phys A 36(43), 10967, 2003). Panchenko and Talagrand (Probab Theo Relat Fields 130(3):319–336, 2004) simplified the proof and generalized the result of Franz and Leone (J Stat Phys 111(3–4):535–564, 2003) for the Poisson case. We provide a new proof for the general degree distribution case and as a corollary, we obtain new bounds for the size of the largest independent set (also known as hard core model) in a large random regular graph. Our proof uses a combinatorial interpolation based on biased random walks (Salez in Combin Probab Comput 25(03):436–447, 2016) and allows to bypass the arguments in Franz et al. (J Phys A 36(43):10967, 2003) based on the study of the Sherrington–Kirkpatrick (SK) model.  相似文献   

8.
Recently, La Guardia constructed some new quantum codes from cyclic codes (La Guardia, Int. J. Theor. Phys., 2017). Inspired by this work, we consider quantum codes construction from negacyclic codes, not equivalent to cyclic codes, with only one cyclotomic coset containing at least two odd consecutive integers of even length. Some new quantum codes are obtained by this class of negacyclic codes.  相似文献   

9.
Recently, Wang et al. presented a bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom (Int. J. Theor. Phys. 54(10): 3443-3453, 2015). They claimed that their protocol was efficient and removed the drawback of information leakage. However, we found that the information leakage actually exists in their protocol. In this paper, we analyze Wang et al.’s protocol in detail. In addition, we propose an improvement to avoid the information leakage. The security of the improved protocol has also been discussed.  相似文献   

10.
In this paper the Lagrangian density of a purely kinetic k-essence model that describes the behavior of dark energy described by four parameterized equations of state proposed by Cooray and Huterer (Astrophys J 513:L95, 1999), Zhang and Wu (Mod Phys Lett A 27:1250030, 2012), Linder (Phys Rev Lett 90:091301, 2003), Efstathiou (Mon Not R Astron Soc 310:842, 2000), and Feng and Lu (J Cosmol Astropart Phys 1111:34, 2011) has been reconstructed. This reconstruction is performed using the method outlined by de Putter and Linder (Astropart Phys 28:263, 2007), which makes it possible to solve the equations that relate the Lagrangian density of the k-essence with the given equation of state (EoS) numerically. Finally, we discuss the observational constraints for the models based on 1049 SNIa data points from the Pantheon data set compiled by Scolnic et al. (Astrophys J 859(2):101, 2018)  相似文献   

11.
Synthetic differential geometry occupies a unique position in topos-theoretic physics. Nevertheless it has appeared somewhat too conceptual to physicists in general, partly because it has appeared to lack computational aspects. Its computational facets are really concerned with computation of the quasi-colimit of a finite diagram of infinitesimal spaces, or equivalently, with computation of the limit of a finite diagram of Weil algebras. Indeed we have been forced to do a highly involved computation of the above kind by hand in our previous papers (Nishimura, H. in Int. J. Theor. Phys. 36:1099–1131, 1997 and Nishimura, H. in Int. J. Theor. Phys. 38:2163–2174, 1999). The principal objective in this paper is to show that Grö bner bases techniques provide us with means that relegate such computations to computers.  相似文献   

12.
We consider one dimensional weakly asymmetric boundary driven models of heat conduction. In the cases of a constant diffusion coefficient and of a quadratic mobility we compute the quasi-potential that is a non local functional obtained by the solution of a variational problem. This is done using the dynamic variational approach of the macroscopic fluctuation theory (Bertini et al. in Rev Mod Phys 87:593, 2015). The case of a concave mobility corresponds essentially to the exclusion model that has been discussed in Bertini et al. (J Stat Mech L11001, 2010; Pure Appl Math 64(5):649–696, 2011; Commun Math Phys 289(1):311–334, 2009) and Enaud and Derrida (J Stat Phys 114:537–562, 2004). We consider here the convex case that includes for example the Kipnis-Marchioro-Presutti (KMP) model and its dual (KMPd) (Kipnis et al. in J Stat Phys 27:6574, 1982). This extends to the weakly asymmetric regime the computations in Bertini et al. (J Stat Phys 121(5/6):843–885, 2005). We consider then, both microscopically and macroscopically, the limit of large externalfields. Microscopically we discuss some possible totally asymmetric limits of the KMP model. In one case the totally asymmetric dynamics has a product invariant measure. Another possible limit dynamics has instead a non trivial invariant measure for which we give a duality representation. Macroscopically we show that the quasi-potentials of KMP and KMPd, which are non local for any value of the external field, become local in the limit. Moreover the dependence on one of the external reservoirs disappears. For models having strictly positive quadratic mobilities we obtain instead in the limit a non local functional having a structure similar to the one of the boundary driven asymmetric exclusion process.  相似文献   

13.
Recently, Huang and Zhao (Int. J. Theor. Phys. 56, 678, 2017) proposed a new scheme for controlled remote state preparation of an arbitrary two-qubit state by using two sets of three-qubit GHZ states as the quantum channel. In the scheme, Alice and Bob choose four different kinds of two-qubit projective measurement bases to measure their local qubits, respectively. We demonstrate that two sets of four-qubit GHZ states can be used to realize the deterministic controlled remote state preparation of an arbitrary two-qubit state by performing only two-qubit projective measurements.  相似文献   

14.
David Finkelstein was very fond of the new information-theoretic paradigm of physics advocated by John Archibald Wheeler and Richard Feynman. Only recently, however, the paradigm has concretely shown its full power, with the derivation of quantum theory (Chiribella et al., Phys. Rev. A 84:012311, 2011; D’Ariano et al., 2017) and of free quantum field theory (D’Ariano and Perinotti, Phys. Rev. A 90:062106, 2014; Bisio et al., Phys. Rev. A 88:032301, 2013; Bisio et al., Ann. Phys. 354:244, 2015; Bisio et al., Ann. Phys. 368:177, 2016) from informational principles. The paradigm has opened for the first time the possibility of avoiding physical primitives in the axioms of the physical theory, allowing a re-foundation of the whole physics over logically solid grounds. In addition to such methodological value, the new information-theoretic derivation of quantum field theory is particularly interesting for establishing a theoretical framework for quantum gravity, with the idea of obtaining gravity itself as emergent from the quantum information processing, as also suggested by the role played by information in the holographic principle (Susskind, J. Math. Phys. 36:6377, 1995; Bousso, Rev. Mod. Phys. 74:825, 2002). In this paper I review how free quantum field theory is derived without using mechanical primitives, including space-time, special relativity, Hamiltonians, and quantization rules. The theory is simply provided by the simplest quantum algorithm encompassing a countable set of quantum systems whose network of interactions satisfies the three following simple principles: homogeneity, locality, and isotropy. The inherent discrete nature of the informational derivation leads to an extension of quantum field theory in terms of a quantum cellular automata and quantum walks. A simple heuristic argument sets the scale to the Planck one, and the currently observed regime where discreteness is not visible is the so-called “relativistic regime” of small wavevectors, which holds for all energies ever tested (and even much larger), where the usual free quantum field theory is perfectly recovered. In the present quantum discrete theory Einstein relativity principle can be restated without using space-time in terms of invariance of the eigenvalue equation of the automaton/walk under change of representations. Distortions of the Poincaré group emerge at the Planck scale, whereas special relativity is perfectly recovered in the relativistic regime. Discreteness, on the other hand, has some plus compared to the continuum theory: 1) it contains it as a special regime; 2) it leads to some additional features with GR flavor: the existence of an upper bound for the particle mass (with physical interpretation as the Planck mass), and a global De Sitter invariance; 3) it provides its own physical standards for space, time, and mass within a purely mathematical adimensional context. The paper ends with the future perspectives of this project, and with an Appendix containing biographic notes about my friendship with David Finkelstein, to whom this paper is dedicated.  相似文献   

15.
We point out that the quantum Grad’s 13-moment system (Yano in Physica A 416:231–241, 2014) is lack of global hyperbolicity, and even worse, the thermodynamic equilibrium is not an interior point of the hyperbolicity region of the system. To remedy this problem, by fully considering Grad’s expansion, we split the expansion into the equilibrium part and the non-equilibrium part, and propose a regularization for the system with the help of the new hyperbolic regularization theory developed in Cai et al. (SIAM J Appl Math 75(5):2001–2023, 2015) and Fan et al. (J Stat Phys 162(2):457–486, 2016). This provides us a new model which is hyperbolic for all admissible thermodynamic states, and meanwhile preserves the approximate accuracy of the original system. It should be noted that this procedure is not a trivial application of the hyperbolic regularization theory.  相似文献   

16.
Recently, by using the BB84 quantum key distribution (QKD) protocol, Sun et al. put forward two quantum private comparison (QPC) protocols with a semi-honest third party (TP) and a malicious TP, respectively (Sun et al., Quantum Inf. Process. 14, 2125–2133, 2015). In this paper, we absorb the concept of semi-quantumness suggested by Boyer et al. (Phys. Rev. Lett. 99(14), 140501, 2007 and Phys. Rev. A 79(3), 032341, 2009) into Sun et al.’s QPC protocols and construct two corresponding SQPC protocols. The common interesting feature of the proposed SQPC protocols is that apart from the establishment of shared keys between different participants, the rest parts of the protocols are completely classical. The output correctness and the security of the proposed SQPC protocols are validated. Compared with the present SQPC protocols, the advantages of the proposed SQPC protocols lies in the following aspects: on the aspect of quantum resource, they employ single photons rather than Bell entangled states; with respect to quantum measurement for TP, they need single-photon measurements rather than Bell state measurements; as for quantum entanglement swapping, they do not need it at all; and the second proposed SQPC protocol takes effect under a malicious TP and makes TP know neither the genuine contents of secret inputs nor the comparison result.  相似文献   

17.
Quantum Fisher Information (QFI) is a very useful concept for analyzing situations that require phase sensitivity. It become a popular topic especially in Quantum Metrology domain. In this work, we study the changes in quantum Fisher information (QFI) values for one relative arbitrary phased quantum system consisting of a superposition of N Qubits W and GHZ states. In a recent work (Ozaydin et al. Int. J. Theor. Phys. 52, 2977, 2013), QFI values of this mentioned system for N qubits were studied. In this work, we extend this problem for the changes of QFI values in some noisy channels for the studied system. We show the changes in QFI depending on noise parameters. We report interesting results for different type of decoherence channels. We show the general case results for this problem.  相似文献   

18.
Recently I published an article in this journal entitled “Less interpretation and more decoherence in quantum gravity and inflationary cosmology” (Crull in Found Phys 45(9):1019–1045, 2015). This article generated responses from three pairs of authors: Vassallo and Esfeld (Found Phys 45(12):1533–1536, 2015), Okon and Sudarsky (Found Phys 46(7):852–879, 2016) and Fortin and Lombardi (Found Phys, 2017). In what follows, I reply to the criticisms raised by these authors.  相似文献   

19.
In a recent paper, Xie et al. (Int. Theor. Phys. 54, 3819–3824, 2015) proposed a semi-quantum secret sharing scheme based on specific bits. In this paper, a simple attack strategy (intercept-resend attack) is shown to prove that the Xie et al.’s scheme is not secure for a dishonest participant, and an improved protocol based on GHZ state is proposed. The improved protocol is secure and improves the efficiency of the previous one.  相似文献   

20.
We study mutually unbiased unextendible maximally entangled bases (MUUMEBs) in bipartite stystem \(\mathbb {C}^{d}\otimes \mathbb {C}^{d + 1}\). By deriving the sufficient and necessary conditions that two MUUMEBs in \(\mathbb {C}^{3}\otimes \mathbb {C}^{4}\) need to satisfy, we first establish two pairs of MUUMEBs in \(\mathbb {C}^{3}\otimes \mathbb {C}^{4}\). Then we present the sufficient and necessary conditions that two MUUMEBs in bipartite system \(\mathbb {C}^{d}\otimes \mathbb {C}^{d + 1}\) need to satisfy, thus generalize the main results of Halqem et al. (Int. J. Theor. Phys. 54(1), 326, 2015).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号